[{"name":"S3-240311","title":"Updates to Security for Selective SCG Activation","source":"Nokia, Nokia Shanghai Bell","contact":"Stawros Orkopoulos","contact-id":96699,"tdoctype":"draftCR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":170,"status":"noted","reservation_date":"2024-02-14 13:48:20","uploaded":"2024-02-19 07:30:21","revisionof":"S3-235100","revisedto":"","release":"Rel-18","crspec":"33.501","crspecversion":"18.4.0","workitem":[{"winame":"TEI18"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115_Athens\/Docs\/S3-240311.zip","group":"S3","meeting":"S3-115","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240312","title":"Security Enhancement on selective SCG Activation","source":"Nokia, Nokia Shanghai Bell","contact":"Stawros Orkopoulos","contact-id":96699,"tdoctype":"discussion","for":"Discussion","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":160,"status":"noted","reservation_date":"2024-02-14 13:49:53","uploaded":"2024-02-19 07:30:21","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115_Athens\/Docs\/S3-240312.zip","group":"S3","meeting":"S3-115","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240329","title":"Correction of UDM service naming","source":"BSI (DE)","contact":"Ben Lorenz","contact-id":98835,"tdoctype":"CR","for":"","abstract":"This is a copy of a CR from Gothenburg S3-234191, which was already agreed but did not got fully implemented. The 2nd change was missing in the implementation. No discussion needed. It should automatically be agreed.","secretary_remarks":"Source modified on 2\/19\/2024. Original source : BSI (DE)","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":3290,"status":"revised","reservation_date":"2024-02-16 08:02:17","uploaded":"2024-02-19 08:58:22","revisionof":"","revisedto":"S3-240857","release":"Rel-18","crspec":"33.501","crspecversion":"18.4.0","workitem":[{"winame":"5GS_Ph1-SEC"}],"crnumber":1900.0,"crrevision":"","crcategory":"A","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115_Athens\/Docs\/S3-240329.zip","group":"S3","meeting":"S3-115","year":2024,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":true,"clauses_affected":"3.1, 6.1.3.2.0","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240352","title":"Discussion paper of UPU implementation gaps","source":"Nokia, Nokia Shanghai Bell","contact":"Saurabh Khare","contact-id":90999,"tdoctype":"discussion","for":"Discussion","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":3520,"status":"noted","reservation_date":"2024-02-16 12:54:05","uploaded":"2024-02-19 11:18:51","revisionof":"","revisedto":"","release":"Rel-18","crspec":"33.501","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115_Athens\/Docs\/S3-240352.zip","group":"S3","meeting":"S3-115","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240353","title":"Enhancement in UPU procedure to protect UPU header","source":"Nokia, Nokia Shanghai Bell","contact":"Saurabh Khare","contact-id":90999,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"Source modified on 2\/19\/2024. Original source : Nokia, Nokia Shanghai Bell","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":3530,"status":"merged","reservation_date":"2024-02-16 12:54:05","uploaded":"2024-02-19 11:18:51","revisionof":"","revisedto":"","release":"Rel-18","crspec":"33.501","crspecversion":"18.4.0","workitem":[{"winame":"TEI18"}],"crnumber":1901.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115_Athens\/Docs\/S3-240353.zip","group":"S3","meeting":"S3-115","year":2024,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":true,"clauses_affected":"6.15.2.1,","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240355","title":"Editorial Correction","source":"Nokia, Nokia Shanghai Bell","contact":"Saurabh Khare","contact-id":90999,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":3550,"status":"merged","reservation_date":"2024-02-16 12:54:06","uploaded":"2024-02-19 11:18:51","revisionof":"","revisedto":"","release":"Rel-18","crspec":"33.501","crspecversion":"18.4.0","workitem":[{"winame":"HN_Auth"}],"crnumber":1902.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115_Athens\/Docs\/S3-240355.zip","group":"S3","meeting":"S3-115","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240370","title":"Discussion on UDM authentication verification of synchronization failure message","source":"BSI (DE)","contact":"Ben Lorenz","contact-id":98835,"tdoctype":"discussion","for":"Discussion","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":3700,"status":"noted","reservation_date":"2024-02-16 14:55:16","uploaded":"2024-02-19 08:58:22","revisionof":"","revisedto":"","release":"Rel-19","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115_Athens\/Docs\/S3-240370.zip","group":"S3","meeting":"S3-115","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240371","title":"Add the case of a failed AUTS verification in the UDM\/ARPF to the synchronization failure recovery of the Home Network","source":"BSI (DE)","contact":"Ben Lorenz","contact-id":98835,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"Source modified on 2\/19\/2024. Original source : BSI (DE)","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":3710,"status":"not pursued","reservation_date":"2024-02-16 14:58:09","uploaded":"2024-02-19 08:58:22","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.501","crspecversion":"18.4.0","workitem":[{"winame":"TEI19"}],"crnumber":1903.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115_Athens\/Docs\/S3-240371.zip","group":"S3","meeting":"S3-115","year":2024,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":true,"clauses_affected":"6.1.3.3.2","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240372","title":"Add the case of a failed AUTS verification in the  HE\/AuC to the re-synchronisation procedure","source":"BSI (DE)","contact":"Ben Lorenz","contact-id":98835,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"Source modified on 2\/19\/2024. Original source : BSI (DE)","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":3720,"status":"not pursued","reservation_date":"2024-02-16 14:59:16","uploaded":"2024-02-19 08:58:22","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.102","crspecversion":"17.0.0","workitem":[{"winame":"TEI19"}],"crnumber":284.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115_Athens\/Docs\/S3-240372.zip","group":"S3","meeting":"S3-115","year":2024,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":false,"clauses_affected":"6.3.5","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240373","title":"Add UDM threat reference for missing verification of synchronization failure messages.","source":"BSI (DE)","contact":"Ben Lorenz","contact-id":98835,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"Source modified on 2\/19\/2024. Original source : BSI (DE)","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":3730,"status":"not pursued","reservation_date":"2024-02-16 15:01:23","uploaded":"2024-02-19 08:58:23","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.926","crspecversion":"18.2.0","workitem":[{"winame":"SCAS_5G_Ph3"}],"crnumber":87.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115_Athens\/Docs\/S3-240373.zip","group":"S3","meeting":"S3-115","year":2024,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":false,"clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240395","title":"Add missing RFC4122 in References section","source":"Ericsson","contact":"Niraj Rathod","contact-id":98988,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"Source modified on 2\/19\/2024. Original source : Ericsson","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":3950,"status":"revised","reservation_date":"2024-02-18 18:55:49","uploaded":"2024-02-19 08:30:46","revisionof":"","revisedto":"S3-240845","release":"Rel-16","crspec":"33.310","crspecversion":"16.15.0","workitem":[{"winame":"5G_eSBA"}],"crnumber":190.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115_Athens\/Docs\/S3-240395.zip","group":"S3","meeting":"S3-115","year":2024,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":false,"clauses_affected":"2","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240396","title":"Add missing RFC4122 in References section","source":"Ericsson","contact":"Niraj Rathod","contact-id":98988,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"Source modified on 2\/19\/2024. Original source : Ericsson","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":3960,"status":"revised","reservation_date":"2024-02-18 18:59:18","uploaded":"2024-02-19 08:30:46","revisionof":"","revisedto":"S3-240846","release":"Rel-17","crspec":"33.310","crspecversion":"17.8.0","workitem":[{"winame":"5G_eSBA"}],"crnumber":191.0,"crrevision":"","crcategory":"A","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115_Athens\/Docs\/S3-240396.zip","group":"S3","meeting":"S3-115","year":2024,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":false,"clauses_affected":"2","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240397","title":"Add missing RFC4122 in References section","source":"Ericsson","contact":"Niraj Rathod","contact-id":98988,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"Source modified on 2\/19\/2024. Original source : Ericsson","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":3970,"status":"revised","reservation_date":"2024-02-18 19:02:23","uploaded":"2024-02-19 08:30:46","revisionof":"","revisedto":"S3-240847","release":"Rel-18","crspec":"33.310","crspecversion":"18.2.0","workitem":[{"winame":"5G_eSBA"}],"crnumber":192.0,"crrevision":"","crcategory":"A","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115_Athens\/Docs\/S3-240397.zip","group":"S3","meeting":"S3-115","year":2024,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":false,"clauses_affected":"2","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240399","title":"Clarify pre-registration in CA\/RA for NF instance ID verification","source":"Ericsson","contact":"Niraj Rathod","contact-id":98988,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"Source modified on 2\/19\/2024. Original source : Ericsson","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":3990,"status":"revised","reservation_date":"2024-02-18 19:36:12","uploaded":"2024-02-19 08:30:00","revisionof":"","revisedto":"S3-240848","release":"Rel-18","crspec":"33.310","crspecversion":"18.2.0","workitem":[{"winame":"ACM_SBA"}],"crnumber":193.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115_Athens\/Docs\/S3-240399.zip","group":"S3","meeting":"S3-115","year":2024,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":true,"clauses_affected":"10.2.3","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240423","title":"Revocation procedure invoked by resource owner client","source":"Huawei, HiSilicon","contact":"Zander (Zhongding) Lei","contact-id":66556,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":30,"status":"merged","reservation_date":"2024-02-19 02:18:29","uploaded":"2024-02-19 12:09:38","revisionof":"","revisedto":"","release":"Rel-18","crspec":"33.122","crspecversion":"18.2.0","workitem":[{"winame":"SNAAPPY"}],"crnumber":57.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115_Athens\/Docs\/S3-240423.zip","group":"S3","meeting":"S3-115","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240424","title":"Revocation procedures invoked by API invoker","source":"Huawei, HiSilicon","contact":"Zander (Zhongding) Lei","contact-id":66556,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"Source modified on 2\/19\/2024. Original source : Huawei, HiSilicon","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":40,"status":"merged","reservation_date":"2024-02-19 02:18:29","uploaded":"2024-02-19 12:09:38","revisionof":"","revisedto":"","release":"Rel-18","crspec":"33.122","crspecversion":"18.2.0","workitem":[{"winame":"SNAAPPY"}],"crnumber":58.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115_Athens\/Docs\/S3-240424.zip","group":"S3","meeting":"S3-115","year":2024,"uicc_affected":false,"me_affected":true,"ran_affected":false,"cn_affected":true,"clauses_affected":"2, 6.5.3.4.x (new)","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240425","title":"Correction on authentication and authorization for RNAA","source":"Huawei, HiSilicon","contact":"Zander (Zhongding) Lei","contact-id":66556,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"Source modified on 2\/19\/2024. Original source : Huawei, HiSilicon","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":120,"status":"agreed","reservation_date":"2024-02-19 02:18:30","uploaded":"2024-02-19 12:09:38","revisionof":"","revisedto":"","release":"Rel-18","crspec":"33.122","crspecversion":"18.2.0","workitem":[{"winame":"SNAAPPY"}],"crnumber":59.0,"crrevision":"","crcategory":"F","tsg_crp":"SP-240370","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115_Athens\/Docs\/S3-240425.zip","group":"S3","meeting":"S3-115","year":2024,"uicc_affected":false,"me_affected":true,"ran_affected":false,"cn_affected":true,"clauses_affected":"6.5.3.1","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240426","title":"Access token profile for Annex C","source":"Huawei, HiSilicon","contact":"Zander (Zhongding) Lei","contact-id":66556,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"Title modified on 2\/19\/2024. Original title : Token profile for RNAA<br\/><br\/>Source modified on 2\/19\/2024. Original source : Huawei, HiSilicon","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":90,"status":"revised","reservation_date":"2024-02-19 02:18:31","uploaded":"2024-02-19 12:09:38","revisionof":"","revisedto":"S3-240852","release":"Rel-18","crspec":"33.122","crspecversion":"18.2.0","workitem":[{"winame":"SNAAPPY"}],"crnumber":60.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115_Athens\/Docs\/S3-240426.zip","group":"S3","meeting":"S3-115","year":2024,"uicc_affected":false,"me_affected":true,"ran_affected":false,"cn_affected":true,"clauses_affected":"Annex C","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240427","title":"Clarification to flow selection for RNAA","source":"Huawei, HiSilicon","contact":"Zander (Zhongding) Lei","contact-id":66556,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"Source modified on 2\/19\/2024. Original source : Huawei, HiSilicon","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":10,"status":"revised","reservation_date":"2024-02-19 02:18:31","uploaded":"2024-02-19 12:09:38","revisionof":"","revisedto":"S3-240849","release":"Rel-18","crspec":"33.122","crspecversion":"18.2.0","workitem":[{"winame":"SNAAPPY"}],"crnumber":61.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115_Athens\/Docs\/S3-240427.zip","group":"S3","meeting":"S3-115","year":2024,"uicc_affected":false,"me_affected":true,"ran_affected":false,"cn_affected":true,"clauses_affected":"6.3.1.2, 6.5.3.1","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240428","title":"Issue in NSSAA procedures for multiple registration","source":"Huawei, HiSilicon","contact":"Zander (Zhongding) Lei","contact-id":66556,"tdoctype":"discussion","for":"Endorsement","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":4280,"status":"revised","reservation_date":"2024-02-19 02:18:32","uploaded":"2024-02-19 12:09:38","revisionof":"","revisedto":"S3-240868","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115_Athens\/Docs\/S3-240428.zip","group":"S3","meeting":"S3-115","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240433","title":"Editorial changes to TS33.310","source":"Huawei, HiSilicon","contact":"Zander (Zhongding) Lei","contact-id":66556,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"Title modified on 2\/19\/2024. Original title : Editorial change to TS 33.310<br\/><br\/>Source modified on 2\/19\/2024. Original source : Huawei, HiSilicon","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":4330,"status":"agreed","reservation_date":"2024-02-19 02:18:34","uploaded":"2024-02-19 12:09:39","revisionof":"","revisedto":"","release":"Rel-18","crspec":"33.310","crspecversion":"18.2.0","workitem":[{"winame":"TEI18"}],"crnumber":194.0,"crrevision":"","crcategory":"F","tsg_crp":"SP-240371","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115_Athens\/Docs\/S3-240433.zip","group":"S3","meeting":"S3-115","year":2024,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":true,"clauses_affected":"2, 3.2, 10.2.3, 10.3.1.3","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240458","title":"Discussion on the failure cases in home network triggered re-authentication","source":"ZTE Corporation","contact":"Yuze Liu","contact-id":97142,"tdoctype":"discussion","for":"Discussion","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":4580,"status":"noted","reservation_date":"2024-02-19 03:26:13","uploaded":"2024-02-19 08:36:13","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115_Athens\/Docs\/S3-240458.zip","group":"S3","meeting":"S3-115","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240461","title":"Clear up for HONTRA procedure","source":"ZTE Corporation","contact":"Yuze Liu","contact-id":97142,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"Source modified on 2\/19\/2024. Original source : ZTE Corporation","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":4610,"status":"revised","reservation_date":"2024-02-19 03:26:14","uploaded":"2024-02-19 08:36:13","revisionof":"","revisedto":"S3-240853","release":"Rel-18","crspec":"33.501","crspecversion":"18.4.0","workitem":[{"winame":"HN_Auth"}],"crnumber":1911.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115_Athens\/Docs\/S3-240461.zip","group":"S3","meeting":"S3-115","year":2024,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":true,"clauses_affected":"6.1.5.2","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240462","title":"Add service operations to TS 33.501 based on HONTRA","source":"ZTE Corporation","contact":"Yuze Liu","contact-id":97142,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"Source modified on 2\/19\/2024. Original source : ZTE Corporation","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":4620,"status":"agreed","reservation_date":"2024-02-19 03:26:15","uploaded":"2024-02-19 08:36:13","revisionof":"","revisedto":"","release":"Rel-18","crspec":"33.501","crspecversion":"18.4.0","workitem":[{"winame":"HN_Auth"}],"crnumber":1912.0,"crrevision":"","crcategory":"F","tsg_crp":"SP-240355","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115_Athens\/Docs\/S3-240462.zip","group":"S3","meeting":"S3-115","year":2024,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":true,"clauses_affected":"14.2.1","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240471","title":"Add some context to 5GMSG on AKMA Ua star protocol","source":"ZTE FRANCE SASU","contact":"Yuze Liu","contact-id":97142,"tdoctype":"CR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":4710,"status":"withdrawn","reservation_date":"2024-02-19 03:32:02","uploaded":"2024-02-19 08:36:13","revisionof":"","revisedto":"","release":"Rel-18","crspec":"33.501","crspecversion":"18.4.0","workitem":[{"winame":"5GMSG"}],"crnumber":1914.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115_Athens\/Docs\/S3-240471.zip","group":"S3","meeting":"S3-115","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240472","title":"TS 33.501 Rel17 CR on correcting NSWO static network name","source":"CableLabs","contact":"Tao Wan","contact-id":79074,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"Source modified on 2\/19\/2024. Original source : CableLabs","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":4720,"status":"not pursued","reservation_date":"2024-02-19 04:26:02","uploaded":"2024-02-19 04:31:36","revisionof":"","revisedto":"","release":"Rel-17","crspec":"33.501","crspecversion":"17.12.0","workitem":[{"winame":"TEI17"}],"crnumber":1915.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115_Athens\/Docs\/S3-240472.zip","group":"S3","meeting":"S3-115","year":2024,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":true,"clauses_affected":"Annex S.3.2","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240473","title":"TS 33.501 Rel18 CR on correcting NSWO static network name","source":"CableLabs","contact":"Tao Wan","contact-id":79074,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"Source modified on 2\/19\/2024. Original source : CableLabs","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":4730,"status":"not pursued","reservation_date":"2024-02-19 04:29:42","uploaded":"2024-02-19 04:31:37","revisionof":"","revisedto":"","release":"Rel-18","crspec":"33.501","crspecversion":"18.4.0","workitem":[{"winame":"TEI18"}],"crnumber":1916.0,"crrevision":"","crcategory":"A","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115_Athens\/Docs\/S3-240473.zip","group":"S3","meeting":"S3-115","year":2024,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":true,"clauses_affected":"Annex S.3.2","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240475","title":"Alignment of 33.122 for RNAA","source":"NTT DOCOMO","contact":"Alf Zugenmaier","contact-id":52494,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":130,"status":"revised","reservation_date":"2024-02-19 05:20:39","uploaded":"2024-02-19 06:57:34","revisionof":"","revisedto":"S3-241039","release":"Rel-18","crspec":"33.122","crspecversion":"18.2.0","workitem":[{"winame":"SNAAPPY"}],"crnumber":62.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115_Athens\/Docs\/S3-240475.zip","group":"S3","meeting":"S3-115","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240512","title":"Update the Security for Subsequent CPAC","source":"Huawei, HiSilicon","contact":"Ao Lei","contact-id":84307,"tdoctype":"other","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":190,"status":"merged","reservation_date":"2024-02-19 07:17:37","uploaded":"2024-02-19 13:06:01","revisionof":"","revisedto":"","release":"Rel-18","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115_Athens\/Docs\/S3-240512.zip","group":"S3","meeting":"S3-115","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240530","title":"Clarification on the function of UE ID trusted non-3GPP access","source":"Huawei, HiSilicon","contact":"Ao Lei","contact-id":84307,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"Source modified on 2\/19\/2024. Original source : Huawei, HiSilicon","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":5300,"status":"revised","reservation_date":"2024-02-19 07:17:38","uploaded":"2024-02-19 13:06:55","revisionof":"","revisedto":"S3-240992","release":"Rel-18","crspec":"33.501","crspecversion":"18.4.0","workitem":[{"winame":"TEI18"}],"crnumber":1923.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115_Athens\/Docs\/S3-240530.zip","group":"S3","meeting":"S3-115","year":2024,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":true,"clauses_affected":"7A.2.1","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240532","title":"CR on key misalignment","source":"Huawei, HiSilicon","contact":"Ao Lei","contact-id":84307,"tdoctype":"draftCR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":5320,"status":"noted","reservation_date":"2024-02-19 07:17:39","uploaded":"2024-02-19 13:06:55","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.501","crspecversion":"18.4.0","workitem":[{"winame":"TEI19"}],"crnumber":"","crrevision":"","crcategory":"B","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115_Athens\/Docs\/S3-240532.zip","group":"S3","meeting":"S3-115","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240534","title":"Updates to the certificate lifecycle management","source":"Huawei, HiSilicon","contact":"Ao Lei","contact-id":84307,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"Title modified on 2\/19\/2024. Original title : CR to update certificate lifecycle managemnet<br\/><br\/>Source modified on 2\/19\/2024. Original source : Huawei, HiSilicon","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":5340,"status":"not pursued","reservation_date":"2024-02-19 07:17:39","uploaded":"2024-02-19 13:06:55","revisionof":"","revisedto":"","release":"Rel-18","crspec":"33.310","crspecversion":"18.2.0","workitem":[{"winame":"ACM_SBA"}],"crnumber":195.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115_Athens\/Docs\/S3-240534.zip","group":"S3","meeting":"S3-115","year":2024,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":true,"clauses_affected":"10.6","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240535","title":"Clarifications to the CMP message protection","source":"Huawei, HiSilicon","contact":"Ao Lei","contact-id":84307,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"Title modified on 2\/19\/2024. Original title : CR to update Certification request and Certification Response<br\/><br\/>Source modified on 2\/19\/2024. Original source : Huawei, HiSilicon","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":5350,"status":"agreed","reservation_date":"2024-02-19 07:17:40","uploaded":"2024-02-19 13:06:55","revisionof":"","revisedto":"","release":"Rel-18","crspec":"33.310","crspecversion":"18.2.0","workitem":[{"winame":"ACM_SBA"}],"crnumber":196.0,"crrevision":"","crcategory":"F","tsg_crp":"SP-240343","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115_Athens\/Docs\/S3-240535.zip","group":"S3","meeting":"S3-115","year":2024,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":true,"clauses_affected":"10.3.1.4.4","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240575","title":"CR on Security vulnerability fix for use of AES-GCM and AES-GMAC in 33.203","source":"Apple","contact":"Ivy Guo","contact-id":76339,"tdoctype":"CR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":5750,"status":"revised","reservation_date":"2024-02-19 08:16:17","uploaded":"2024-02-19 08:44:50","revisionof":"","revisedto":"S3-240855, SP-240287","release":"Rel-18","crspec":"33.203","crspecversion":"17.1.0","workitem":[{"winame":"TEI18"}],"crnumber":278.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115_Athens\/Docs\/S3-240575.zip","group":"S3","meeting":"S3-115","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240580","title":"Updates to the SBA certificate profile","source":"Nokia, Nokia Shanghai Bell","contact":"German Peinado","contact-id":93903,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"Source modified on 2\/19\/2024. Original source : Nokia, Nokia Shanghai Bell","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":5800,"status":"not pursued","reservation_date":"2024-02-19 08:23:22","uploaded":"2024-02-19 09:27:26","revisionof":"","revisedto":"S3-241825","release":"Rel-18","crspec":"33.310","crspecversion":"18.2.0","workitem":[{"winame":"ACM_SBA"}],"crnumber":197.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115_Athens\/Docs\/S3-240580.zip","group":"S3","meeting":"S3-115","year":2024,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":true,"clauses_affected":"6.1.3c","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240583","title":"Correction to validation of usage of X.509 certificate procedure","source":"Nokia, Nokia Shanghai Bell, Ericsson","contact":"German Peinado","contact-id":93903,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"Source modified on 2\/19\/2024. Original source : Nokia, Nokia Shanghai Bell, Ericsson","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":5830,"status":"revised","reservation_date":"2024-02-19 08:23:24","uploaded":"2024-02-19 09:31:40","revisionof":"","revisedto":"S3-240993","release":"Rel-18","crspec":"33.310","crspecversion":"18.2.0","workitem":[{"winame":"ACM_SBA"}],"crnumber":199.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115_Athens\/Docs\/S3-240583.zip","group":"S3","meeting":"S3-115","year":2024,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":true,"clauses_affected":"10.4","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240608","title":"Comments on SCG Activation papers","source":"Intel Technology Poland SP Zoo","contact":"Abhijeet Kolekar","contact-id":66157,"tdoctype":"discussion","for":"Endorsement","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":220,"status":"noted","reservation_date":"2024-02-19 08:58:38","uploaded":"2024-02-19 09:10:51","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115_Athens\/Docs\/S3-240608.zip","group":"S3","meeting":"S3-115","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240619","title":"Updates to Security for Selective SCG Activation","source":"Intel Technology Poland SP Zoo","contact":"Abhijeet Kolekar","contact-id":66157,"tdoctype":"draftCR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":230,"status":"merged","reservation_date":"2024-02-19 09:01:38","uploaded":"2024-02-19 09:10:51","revisionof":"","revisedto":"","release":"Rel-18","crspec":"33.501","crspecversion":"18.4.0","workitem":[{"winame":"TEI18"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115_Athens\/Docs\/S3-240619.zip","group":"S3","meeting":"S3-115","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240622","title":"Add some context to 5GMSG on AKMA Ua star protocol","source":"ZTE","contact":"Yuze Liu","contact-id":97142,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"Source modified on 2\/19\/2024. Original source : ZTE Corporation","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":6220,"status":"revised","reservation_date":"2024-02-19 09:03:41","uploaded":"2024-02-19 09:09:52","revisionof":"","revisedto":"S3-240856","release":"Rel-18","crspec":"33.501","crspecversion":"18.4.0","workitem":[{"winame":"TEI18"}],"crnumber":1937.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115_Athens\/Docs\/S3-240622.zip","group":"S3","meeting":"S3-115","year":2024,"uicc_affected":false,"me_affected":true,"ran_affected":false,"cn_affected":true,"clauses_affected":"Annex Y.2, Y.3","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240625","title":"SNAAPPY - Update to RNAA functional security model description","source":"Nokia, Nokia Shanghai Bell","contact":"Anja Jerichow","contact-id":68341,"tdoctype":"CR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":110,"status":"agreed","reservation_date":"2024-02-19 09:14:32","uploaded":"2024-02-19 14:33:17","revisionof":"","revisedto":"","release":"Rel-18","crspec":"33.122","crspecversion":"18.2.0","workitem":[{"winame":"SNAAPPY"}],"crnumber":63.0,"crrevision":"","crcategory":"F","tsg_crp":"SP-240370","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115_Athens\/Docs\/S3-240625.zip","group":"S3","meeting":"S3-115","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240635","title":"Security Negotiation for RNAA","source":"Ericsson","contact":"Ferhat Karakoc","contact-id":86196,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"Title modified on 2\/19\/2024. Original title : Security negotiation for RNAA<br\/><br\/>Source modified on 2\/19\/2024. Original source : Ericsson","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":20,"status":"merged","reservation_date":"2024-02-19 09:25:02","uploaded":"2024-02-19 10:23:56","revisionof":"","revisedto":"","release":"Rel-18","crspec":"33.122","crspecversion":"18.2.0","workitem":[{"winame":"SNAAPPY"}],"crnumber":64.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115_Athens\/Docs\/S3-240635.zip","group":"S3","meeting":"S3-115","year":2024,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":true,"clauses_affected":"6.5.3.1","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240636","title":"Details for RNAA token","source":"Ericsson","contact":"Ferhat Karakoc","contact-id":86196,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"Source modified on 2\/19\/2024. Original source : Ericsson","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":100,"status":"merged","reservation_date":"2024-02-19 09:25:16","uploaded":"2024-02-19 10:23:56","revisionof":"","revisedto":"","release":"Rel-18","crspec":"33.122","crspecversion":"18.2.0","workitem":[{"winame":"SNAAPPY"}],"crnumber":65.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115_Athens\/Docs\/S3-240636.zip","group":"S3","meeting":"S3-115","year":2024,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":true,"clauses_affected":"6.5.3.1, 6.5.3.2, 6.5.3.3, Annex C.2.2, Annex C.3.2","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240647","title":"Forcing the UDR-UDM interface to exclusively use 3GPP-defined security protocols in the non co-located deployment case","source":"BSI (DE)","contact":"Joerg Andreas","contact-id":97336,"tdoctype":"CR","for":"Approval","abstract":"The implementation of specific algorithms for the transmission of long-term persistent keys carries the risk of using unverified algorithms that could be vulnerable to attacks. However, the use of the TLS protocol, as defined by TS 33.501 in section 13.1.","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":6470,"status":"revised","reservation_date":"2024-02-19 09:50:25","uploaded":"2024-02-19 10:06:37","revisionof":"S3-240375","revisedto":"S3-240723","release":"Rel-19","crspec":"33.501","crspecversion":"18.4.0","workitem":[{"winame":"SCAS_5G_UDR"}],"crnumber":1904.0,"crrevision":1.0,"crcategory":"C","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115_Athens\/Docs\/S3-240647.zip","group":"S3","meeting":"S3-115","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240649","title":"Annex regarding assets and threats specific to the PCF network product class","source":"BSI (DE)","contact":"Joerg Andreas","contact-id":97336,"tdoctype":"CR","for":"Approval","abstract":"According to the work item SCAS_5G_PCF and the discussion paper (S3-240015), the PCF is associated with certain threats. However, these threats are not included in TR33.926. This leaves a blind spot on the threat associated with the PCF.","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":6490,"status":"revised","reservation_date":"2024-02-19 09:57:58","uploaded":"2024-02-19 10:06:38","revisionof":"S3-240331","revisedto":"S3-240725","release":"Rel-19","crspec":"33.926","crspecversion":"18.2.0","workitem":[{"winame":"SCAS_5G_PCF"}],"crnumber":86.0,"crrevision":1.0,"crcategory":"B","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115_Athens\/Docs\/S3-240649.zip","group":"S3","meeting":"S3-115","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240663","title":"Discussion on the 3GPP specific JWT claims registration in IANA","source":"Ericsson","contact":"Mohsin Khan","contact-id":94064,"tdoctype":"discussion","for":"Endorsement","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":6630,"status":"noted","reservation_date":"2024-02-19 10:37:06","uploaded":"2024-02-19 12:14:48","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115_Athens\/Docs\/S3-240663.zip","group":"S3","meeting":"S3-115","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240664","title":"Updating Internet Drafts to Final RFCs (Rel-17)","source":"Ericsson","contact":"Mohsin Khan","contact-id":94064,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"Source modified on 2\/19\/2024. Original source : Ericsson","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":6640,"status":"revised","reservation_date":"2024-02-19 10:37:06","uploaded":"2024-02-19 12:15:08","revisionof":"","revisedto":"S3-240858","release":"Rel-17","crspec":"33.434","crspecversion":"17.3.0","workitem":[{"winame":"eSEAL"}],"crnumber":18.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115_Athens\/Docs\/S3-240664.zip","group":"S3","meeting":"S3-115","year":2024,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":true,"clauses_affected":"2, Annex B.3.4, Annex B.3.6","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240665","title":"Updating Internet Drafts to Final RFCs (Rel-18)","source":"Ericsson","contact":"Mohsin Khan","contact-id":94064,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"Source modified on 2\/19\/2024. Original source : Ericsson","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":6650,"status":"revised","reservation_date":"2024-02-19 10:37:07","uploaded":"2024-02-19 12:15:30","revisionof":"","revisedto":"S3-240859","release":"Rel-18","crspec":"33.434","crspecversion":"18.1.0","workitem":[{"winame":"eSEAL"}],"crnumber":19.0,"crrevision":"","crcategory":"A","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115_Athens\/Docs\/S3-240665.zip","group":"S3","meeting":"S3-115","year":2024,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":true,"clauses_affected":"2, Annex B.3.4, Annex B.3.6","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240666","title":"Voiding Reference to TLS 1.1","source":"Ericsson","contact":"Mohsin Khan","contact-id":94064,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"Source modified on 2\/19\/2024. Original source : Ericsson","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":6660,"status":"agreed","reservation_date":"2024-02-19 10:37:09","uploaded":"2024-02-19 12:15:55","revisionof":"","revisedto":"","release":"Rel-16","crspec":"33.501","crspecversion":"16.17.0","workitem":[{"winame":"CryptPr"}],"crnumber":1948.0,"crrevision":"","crcategory":"F","tsg_crp":"SP-240346","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115_Athens\/Docs\/S3-240666.zip","group":"S3","meeting":"S3-115","year":2024,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":false,"clauses_affected":"2","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240667","title":"Voiding Reference to TLS 1.1","source":"Ericsson","contact":"Mohsin Khan","contact-id":94064,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"Source modified on 2\/19\/2024. Original source : Ericsson","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":6670,"status":"agreed","reservation_date":"2024-02-19 10:37:09","uploaded":"2024-02-19 12:16:30","revisionof":"","revisedto":"","release":"Rel-17","crspec":"33.501","crspecversion":"17.12.0","workitem":[{"winame":"CryptPr"}],"crnumber":1949.0,"crrevision":"","crcategory":"A","tsg_crp":"SP-240346","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115_Athens\/Docs\/S3-240667.zip","group":"S3","meeting":"S3-115","year":2024,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":false,"clauses_affected":"2","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240668","title":"Voiding Reference to TLS 1.1","source":"Ericsson","contact":"Mohsin Khan","contact-id":94064,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"Source modified on 2\/19\/2024. Original source : Ericsson","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":6680,"status":"agreed","reservation_date":"2024-02-19 10:37:10","uploaded":"2024-02-19 12:16:49","revisionof":"","revisedto":"","release":"Rel-18","crspec":"33.501","crspecversion":"18.4.0","workitem":[{"winame":"CryptPr"}],"crnumber":1950.0,"crrevision":"","crcategory":"A","tsg_crp":"SP-240346","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115_Athens\/Docs\/S3-240668.zip","group":"S3","meeting":"S3-115","year":2024,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":false,"clauses_affected":"2","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240669","title":"Serving Network Name check at AUSF for the case that the 3gpp-Sbi-Originating-Network-Id header is not included","source":"Ericsson","contact":"Mohsin Khan","contact-id":94064,"tdoctype":"discussion","for":"Discussion","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":6690,"status":"noted","reservation_date":"2024-02-19 10:37:10","uploaded":"2024-02-19 12:17:07","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115_Athens\/Docs\/S3-240669.zip","group":"S3","meeting":"S3-115","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240670","title":"Serving Network Name check at AUSF for the case that the 3gpp-Sbi-Originating-Network-Id header is not included","source":"Ericsson","contact":"Mohsin Khan","contact-id":94064,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"Source modified on 2\/19\/2024. Original source : Ericsson","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":6700,"status":"not pursued","reservation_date":"2024-02-19 10:37:10","uploaded":"2024-02-19 12:17:24","revisionof":"","revisedto":"","release":"Rel-17","crspec":"33.501","crspecversion":"17.12.0","workitem":[{"winame":"TEI17"}],"crnumber":1951.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115_Athens\/Docs\/S3-240670.zip","group":"S3","meeting":"S3-115","year":2024,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":true,"clauses_affected":"6.1.2","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240671","title":"Serving Network Name check at AUSF for the case that the 3gpp-Sbi-Originating-Network-Id header is not included","source":"Ericsson","contact":"Mohsin Khan","contact-id":94064,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"Source modified on 2\/19\/2024. Original source : Ericsson","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":6710,"status":"not pursued","reservation_date":"2024-02-19 10:37:11","uploaded":"2024-02-19 12:17:45","revisionof":"","revisedto":"","release":"Rel-18","crspec":"33.501","crspecversion":"18.4.0","workitem":[{"winame":"TEI17"}],"crnumber":1952.0,"crrevision":"","crcategory":"A","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115_Athens\/Docs\/S3-240671.zip","group":"S3","meeting":"S3-115","year":2024,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":true,"clauses_affected":"6.1.2","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240694","title":"Updates to Security for Selective SCG Activation","source":"Samsung","contact":"Rajavelsamy Rajadurai","contact-id":33521,"tdoctype":"other","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":200,"status":"merged","reservation_date":"2024-02-19 10:52:19","uploaded":"2024-02-19 12:46:59","revisionof":"","revisedto":"","release":"Rel-18","crspec":"33.501","crspecversion":"","workitem":[{"winame":"TEI18"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115_Athens\/Docs\/S3-240694.zip","group":"S3","meeting":"S3-115","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240695","title":"Revocation procedure for RNAA","source":"Samsung","contact":"Rajavelsamy Rajadurai","contact-id":33521,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"Source modified on 2\/19\/2024. Original source : Samsung","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":50,"status":"merged","reservation_date":"2024-02-19 10:52:19","uploaded":"2024-02-19 12:48:28","revisionof":"","revisedto":"","release":"Rel-18","crspec":"33.122","crspecversion":"18.2.0","workitem":[{"winame":"TEI18"}],"crnumber":66.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115_Athens\/Docs\/S3-240695.zip","group":"S3","meeting":"S3-115","year":2024,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":true,"clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240723","title":"Forcing the UDR-UDM interface to exclusively use 3GPP-defined security protocols in the non co-located deployment case","source":"BSI (DE)","contact":"Joerg Andreas","contact-id":97336,"tdoctype":"CR","for":"Agreement","abstract":"The implementation of specific algorithms for the transmission of long-term persistent keys carries the risk of using unverified algorithms that could be vulnerable to attacks. However, the use of the TLS protocol, as defined by TS 33.501 in section 13.1.","secretary_remarks":"Title modified on 2\/19\/2024. Original title : Forcing the UDR-UDM interface to exclusively use 3GPP-defined security protocols in the non co-located deployment case <br\/><br\/>Source modified on 2\/19\/2024. Original source : BSI (DE)","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":7230,"status":"not pursued","reservation_date":"2024-02-19 10:55:41","uploaded":"2024-02-19 11:11:36","revisionof":"S3-240647","revisedto":"","release":"Rel-19","crspec":"33.501","crspecversion":"18.4.0","workitem":[{"winame":"SCAS_5G_UDR"}],"crnumber":1904.0,"crrevision":2.0,"crcategory":"C","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115_Athens\/Docs\/S3-240723.zip","group":"S3","meeting":"S3-115","year":2024,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":false,"clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240725","title":"Annex regarding assets and threats specific to the PCF network product class","source":"BSI (DE)","contact":"Joerg Andreas","contact-id":97336,"tdoctype":"CR","for":"Agreement","abstract":"According to the work item SCAS_5G_PCF and the discussion paper (S3-240015), the PCF is associated with certain threats. However, these threats are not included in TR33.926. This leaves a blind spot on the threat associated with the PCF.","secretary_remarks":"Source modified on 2\/19\/2024. Original source : BSI (DE)","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":7250,"status":"revised","reservation_date":"2024-02-19 10:57:53","uploaded":"2024-02-19 11:11:36","revisionof":"S3-240649","revisedto":"S3-240860","release":"Rel-19","crspec":"33.926","crspecversion":"18.2.0","workitem":[{"winame":"SCAS_5G_PCF"}],"crnumber":86.0,"crrevision":2.0,"crcategory":"B","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115_Athens\/Docs\/S3-240725.zip","group":"S3","meeting":"S3-115","year":2024,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":false,"clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240730","title":"Discussion on protecting header information in UPU","source":"Qualcomm Incorporated","contact":"Adrian Escott","contact-id":24089,"tdoctype":"discussion","for":"Discussion","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":7300,"status":"noted","reservation_date":"2024-02-19 11:24:43","uploaded":"2024-02-19 12:23:59","revisionof":"S3-234701","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115_Athens\/Docs\/S3-240730.zip","group":"S3","meeting":"S3-115","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240731","title":"Protection of UPU header","source":"Qualcomm Incorporated","contact":"Adrian Escott","contact-id":24089,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"Source modified on 2\/19\/2024. Original source : Qualcomm Incorporated","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":7310,"status":"merged","reservation_date":"2024-02-19 11:24:43","uploaded":"2024-02-19 12:24:00","revisionof":"S3-234702","revisedto":"","release":"Rel-18","crspec":"33.501","crspecversion":"18.4.0","workitem":[{"winame":"TEI18"},{"winame":" 5GS_Ph1-SEC"}],"crnumber":1612.0,"crrevision":3.0,"crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115_Athens\/Docs\/S3-240731.zip","group":"S3","meeting":"S3-115","year":2024,"uicc_affected":false,"me_affected":true,"ran_affected":false,"cn_affected":true,"clauses_affected":"6.15.2.1","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240743","title":"SCPAC: Updates to Security for Selective SCG Activation","source":"Ericsson","contact":"Monica Wifvesson","contact-id":13327,"tdoctype":"other","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":210,"status":"merged","reservation_date":"2024-02-19 11:55:32","uploaded":"2024-02-19 13:14:51","revisionof":"","revisedto":"","release":"Rel-18","crspec":"33.501","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115_Athens\/Docs\/S3-240743.zip","group":"S3","meeting":"S3-115","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240744","title":"SCPAC: FC values","source":"Ericsson","contact":"Monica Wifvesson","contact-id":13327,"tdoctype":"other","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":180,"status":"noted","reservation_date":"2024-02-19 11:55:32","uploaded":"2024-02-19 13:15:03","revisionof":"","revisedto":"","release":"Rel-18","crspec":"33.501","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115_Athens\/Docs\/S3-240744.zip","group":"S3","meeting":"S3-115","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240745","title":"SCPAC: Releasing prepared SCPAC configurations at handover","source":"Ericsson","contact":"Monica Wifvesson","contact-id":13327,"tdoctype":"other","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":250,"status":"merged","reservation_date":"2024-02-19 11:55:32","uploaded":"2024-02-19 13:16:26","revisionof":"","revisedto":"","release":"Rel-18","crspec":"33.501","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115_Athens\/Docs\/S3-240745.zip","group":"S3","meeting":"S3-115","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240746","title":"SCPAC: Updates to Security for Selective SCG Activation","source":"Ericsson","contact":"Monica Wifvesson","contact-id":13327,"tdoctype":"other","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":240,"status":"revised","reservation_date":"2024-02-19 11:55:33","uploaded":"2024-02-19 13:35:56","revisionof":"","revisedto":"S3-240841","release":"Rel-18","crspec":"33.501","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115_Athens\/Docs\/S3-240746.zip","group":"S3","meeting":"S3-115","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240747","title":"SCPAC: Algorithm negotiation","source":"Ericsson","contact":"Monica Wifvesson","contact-id":13327,"tdoctype":"other","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":260,"status":"merged","reservation_date":"2024-02-19 11:55:33","uploaded":"2024-02-19 13:36:11","revisionof":"","revisedto":"","release":"Rel-18","crspec":"33.501","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115_Athens\/Docs\/S3-240747.zip","group":"S3","meeting":"S3-115","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240748","title":"SCPAC: Secondary Node key update for SCPAC","source":"Ericsson","contact":"Monica Wifvesson","contact-id":13327,"tdoctype":"other","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":270,"status":"merged","reservation_date":"2024-02-19 11:55:33","uploaded":"2024-02-19 13:37:50","revisionof":"","revisedto":"","release":"Rel-18","crspec":"33.501","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115_Athens\/Docs\/S3-240748.zip","group":"S3","meeting":"S3-115","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240749","title":"SCPAC: Protection of traffic between UE and SN for SCPAC","source":"Ericsson","contact":"Monica Wifvesson","contact-id":13327,"tdoctype":"other","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":280,"status":"merged","reservation_date":"2024-02-19 11:55:33","uploaded":"2024-02-19 13:38:05","revisionof":"","revisedto":"","release":"Rel-18","crspec":"33.501","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115_Athens\/Docs\/S3-240749.zip","group":"S3","meeting":"S3-115","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240754","title":"UPU Header Security","source":"Lenovo","contact":"Sheeba Backia Mary Baskaran","contact-id":86031,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"Title modified on 2\/19\/2024. Original title : UPU Header Protection<br\/><br\/>Source modified on 2\/19\/2024. Original source : Lenovo","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":7540,"status":"revised","reservation_date":"2024-02-19 11:56:25","uploaded":"2024-02-19 14:30:03","revisionof":"","revisedto":"S3-240991","release":"Rel-18","crspec":"33.501","crspecversion":"18.4.0","workitem":[{"winame":"5GS_Ph1-SEC"}],"crnumber":1962.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115_Athens\/Docs\/S3-240754.zip","group":"S3","meeting":"S3-115","year":2024,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":false,"clauses_affected":"6.15.2.1","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240776","title":"Clarification to non-SBA interfaces","source":"Nokia, Nokia Shanghai Bell","contact":"Anja Jerichow","contact-id":68341,"tdoctype":"CR","for":"","abstract":"","secretary_remarks":"Source modified on 2\/19\/2024. Original source : Nokia, Nokia Shanghai Bell","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":7760,"status":"not pursued","reservation_date":"2024-02-19 12:39:31","uploaded":"2024-02-19 14:33:19","revisionof":"","revisedto":"","release":"Rel-18","crspec":"33.501","crspecversion":"18.4.0","workitem":[{"winame":"TEI18"}],"crnumber":1963.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115_Athens\/Docs\/S3-240776.zip","group":"S3","meeting":"S3-115","year":2024,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":true,"clauses_affected":"9.9","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240791","title":"Update for CAPIF 8","source":"Xiaomi","contact":"Wei Lu","contact-id":90295,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"Source modified on 2\/19\/2024. Original source : Xiaomi Communications","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":70,"status":"revised","reservation_date":"2024-02-19 12:51:22","uploaded":"2024-02-19 14:04:44","revisionof":"","revisedto":"S3-240851","release":"Rel-18","crspec":"33.122","crspecversion":"18.2.0","workitem":[{"winame":"SNAAPPY"}],"crnumber":67.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115_Athens\/Docs\/S3-240791.zip","group":"S3","meeting":"S3-115","year":2024,"uicc_affected":false,"me_affected":true,"ran_affected":false,"cn_affected":true,"clauses_affected":"4.8","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240792","title":"Add revocation procedure for RNAA-related tokens","source":"Xiaomi","contact":"Wei Lu","contact-id":90295,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"Source modified on 2\/19\/2024. Original source : Xiaomi Communications","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":60,"status":"revised","reservation_date":"2024-02-19 12:51:23","uploaded":"2024-02-19 14:04:44","revisionof":"","revisedto":"S3-240850","release":"Rel-18","crspec":"33.122","crspecversion":"18.2.0","workitem":[{"winame":"SNAAPPY"}],"crnumber":68.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115_Athens\/Docs\/S3-240792.zip","group":"S3","meeting":"S3-115","year":2024,"uicc_affected":false,"me_affected":true,"ran_affected":false,"cn_affected":true,"clauses_affected":"6.5.3.4","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240793","title":"Resolve ENs related to token claims","source":"Xiaomi","contact":"Wei Lu","contact-id":90295,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"Source modified on 2\/19\/2024. Original source : Xiaomi Communications","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":140,"status":"merged","reservation_date":"2024-02-19 12:51:23","uploaded":"2024-02-19 14:04:44","revisionof":"","revisedto":"","release":"Rel-18","crspec":"33.122","crspecversion":"18.2.0","workitem":[{"winame":"SNAAPPY"}],"crnumber":69.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115_Athens\/Docs\/S3-240793.zip","group":"S3","meeting":"S3-115","year":2024,"uicc_affected":false,"me_affected":true,"ran_affected":false,"cn_affected":true,"clauses_affected":"6.5.3.1, 6.5.3.2, 6.5.3.3","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240794","title":"Resolve EN related to authorization request or token request","source":"Xiaomi","contact":"Wei Lu","contact-id":90295,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"Source modified on 2\/19\/2024. Original source : Xiaomi Communications","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":150,"status":"agreed","reservation_date":"2024-02-19 12:51:24","uploaded":"2024-02-19 14:04:45","revisionof":"","revisedto":"","release":"Rel-18","crspec":"33.122","crspecversion":"18.2.0","workitem":[{"winame":"SNAAPPY"}],"crnumber":70.0,"crrevision":"","crcategory":"F","tsg_crp":"SP-240370","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115_Athens\/Docs\/S3-240794.zip","group":"S3","meeting":"S3-115","year":2024,"uicc_affected":false,"me_affected":true,"ran_affected":false,"cn_affected":true,"clauses_affected":"6.5.3.3","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240795","title":"Resolve ENs related to API invoker ID mapping","source":"Xiaomi","contact":"Wei Lu","contact-id":90295,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"Source modified on 2\/19\/2024. Original source : Xiaomi Communications","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":80,"status":"not pursued","reservation_date":"2024-02-19 12:51:24","uploaded":"2024-02-19 14:04:45","revisionof":"","revisedto":"","release":"Rel-18","crspec":"33.122","crspecversion":"18.2.0","workitem":[{"winame":"SNAAPPY"}],"crnumber":71.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115_Athens\/Docs\/S3-240795.zip","group":"S3","meeting":"S3-115","year":2024,"uicc_affected":false,"me_affected":true,"ran_affected":false,"cn_affected":true,"clauses_affected":"6.5.3.2, 6.5.3.3","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240841","title":"SCPAC: Updates to Security for Selective SCG Activation","source":"Ericsson","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"other","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":241,"status":"approved","reservation_date":"2024-05-03 15:45:09","uploaded":"2024-03-05 15:51:16","revisionof":"S3-240746","revisedto":"","release":"Rel-18","crspec":"33.501","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115_Athens\/Docs\/S3-240841.zip","group":"S3","meeting":"S3-115","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240842","title":"Correction of UDM service naming","source":"BSI (DE)","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"CR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":3291,"status":"agreed","reservation_date":"2024-05-03 15:45:09","uploaded":"2024-03-05 15:51:16","revisionof":"","revisedto":"","release":"Rel-17","crspec":"33.501","crspecversion":"17.12.0","workitem":[{"winame":"5GS_Ph1-SEC"}],"crnumber":1965.0,"crrevision":"","crcategory":"A","tsg_crp":"SP-240342","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115_Athens\/Docs\/S3-240842.zip","group":"S3","meeting":"S3-115","year":2024,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":true,"clauses_affected":"3.1, 6.1.3.2.0","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240843","title":"Correction of UDM service naming","source":"BSI (DE)","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"CR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":3292,"status":"agreed","reservation_date":"2024-05-03 15:45:11","uploaded":"2024-03-05 15:51:16","revisionof":"","revisedto":"","release":"Rel-16","crspec":"33.501","crspecversion":"16.17.0","workitem":[{"winame":"5GS_Ph1-SEC"}],"crnumber":1966.0,"crrevision":"","crcategory":"A","tsg_crp":"SP-240342","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115_Athens\/Docs\/S3-240843.zip","group":"S3","meeting":"S3-115","year":2024,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":true,"clauses_affected":"3.1, 6.1.3.2.0","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240844","title":"Correction of UDM service naming","source":"BSI (DE)","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"CR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":3293,"status":"agreed","reservation_date":"2024-05-03 15:45:12","uploaded":"2024-03-05 15:51:16","revisionof":"","revisedto":"","release":"Rel-15","crspec":"33.501","crspecversion":"15.17.0","workitem":[{"winame":"5GS_Ph1-SEC"}],"crnumber":1967.0,"crrevision":"","crcategory":"F","tsg_crp":"SP-240342","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115_Athens\/Docs\/S3-240844.zip","group":"S3","meeting":"S3-115","year":2024,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":true,"clauses_affected":"3.1, 6.1.3.2.0","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240845","title":"Add missing RFC4122 in References section","source":"Ericsson","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":3951,"status":"agreed","reservation_date":"2024-05-03 15:45:14","uploaded":"2024-03-05 15:51:16","revisionof":"S3-240395","revisedto":"","release":"Rel-16","crspec":"33.310","crspecversion":"16.15.0","workitem":[{"winame":"5G_eSBA"}],"crnumber":190.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"SP-240338","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115_Athens\/Docs\/S3-240845.zip","group":"S3","meeting":"S3-115","year":2024,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":false,"clauses_affected":"2","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240846","title":"Add missing RFC4122 in References section","source":"Ericsson","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":3961,"status":"agreed","reservation_date":"2024-05-03 15:45:15","uploaded":"2024-03-05 15:51:16","revisionof":"S3-240396","revisedto":"","release":"Rel-17","crspec":"33.310","crspecversion":"17.8.0","workitem":[{"winame":"5G_eSBA"}],"crnumber":191.0,"crrevision":1.0,"crcategory":"A","tsg_crp":"SP-240338","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115_Athens\/Docs\/S3-240846.zip","group":"S3","meeting":"S3-115","year":2024,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":false,"clauses_affected":"2","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240847","title":"Add missing RFC4122 in References section","source":"Ericsson","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":3971,"status":"agreed","reservation_date":"2024-05-03 15:45:16","uploaded":"2024-03-05 15:51:16","revisionof":"S3-240397","revisedto":"","release":"Rel-18","crspec":"33.310","crspecversion":"18.2.0","workitem":[{"winame":"5G_eSBA"}],"crnumber":192.0,"crrevision":1.0,"crcategory":"A","tsg_crp":"SP-240338","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115_Athens\/Docs\/S3-240847.zip","group":"S3","meeting":"S3-115","year":2024,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":false,"clauses_affected":"2","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240848","title":"Clarify pre-registration in CA\/RA for NF instance ID verification","source":"Ericsson","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":3991,"status":"agreed","reservation_date":"2024-05-03 15:45:16","uploaded":"2024-03-05 15:51:16","revisionof":"S3-240399","revisedto":"","release":"Rel-18","crspec":"33.310","crspecversion":"18.2.0","workitem":[{"winame":"ACM_SBA"}],"crnumber":193.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"SP-240343","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115_Athens\/Docs\/S3-240848.zip","group":"S3","meeting":"S3-115","year":2024,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":true,"clauses_affected":"10.2.3","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240849","title":"Clarification to flow selection for RNAA","source":"Huawei, HiSilicon","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":11,"status":"agreed","reservation_date":"2024-05-03 15:45:17","uploaded":"2024-03-05 15:51:16","revisionof":"S3-240427","revisedto":"","release":"Rel-18","crspec":"33.122","crspecversion":"18.2.0","workitem":[{"winame":"SNAAPPY"}],"crnumber":61.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"SP-240370","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115_Athens\/Docs\/S3-240849.zip","group":"S3","meeting":"S3-115","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240850","title":"Add revocation procedure for RNAA-related tokens","source":"Xiaomi","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":61,"status":"agreed","reservation_date":"2024-05-03 15:45:18","uploaded":"2024-03-05 15:51:16","revisionof":"S3-240792","revisedto":"","release":"Rel-18","crspec":"33.122","crspecversion":"18.2.0","workitem":[{"winame":"SNAAPPY"}],"crnumber":68.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"SP-240370","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115_Athens\/Docs\/S3-240850.zip","group":"S3","meeting":"S3-115","year":2024,"uicc_affected":false,"me_affected":true,"ran_affected":false,"cn_affected":true,"clauses_affected":"6.5.3.4","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240851","title":"Update for CAPIF 8","source":"Xiaomi","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":71,"status":"agreed","reservation_date":"2024-05-03 15:45:19","uploaded":"2024-03-05 15:51:16","revisionof":"S3-240791","revisedto":"","release":"Rel-18","crspec":"33.122","crspecversion":"18.2.0","workitem":[{"winame":"SNAAPPY"}],"crnumber":67.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"SP-240370","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115_Athens\/Docs\/S3-240851.zip","group":"S3","meeting":"S3-115","year":2024,"uicc_affected":false,"me_affected":true,"ran_affected":false,"cn_affected":true,"clauses_affected":"4.8","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240852","title":"Access token profile for Annex C","source":"Huawei, HiSilicon","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":91,"status":"agreed","reservation_date":"2024-05-03 15:45:20","uploaded":"2024-03-05 15:51:16","revisionof":"S3-240426","revisedto":"","release":"Rel-18","crspec":"33.122","crspecversion":"18.2.0","workitem":[{"winame":"SNAAPPY"}],"crnumber":60.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"SP-240370","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115_Athens\/Docs\/S3-240852.zip","group":"S3","meeting":"S3-115","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240853","title":"Clear up for HONTRA procedure","source":"ZTE Corporation","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":4611,"status":"agreed","reservation_date":"2024-05-03 15:45:21","uploaded":"2024-03-05 15:51:16","revisionof":"S3-240461","revisedto":"","release":"Rel-18","crspec":"33.501","crspecversion":"18.4.0","workitem":[{"winame":"HN_Auth"}],"crnumber":1911.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"SP-240355","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115_Athens\/Docs\/S3-240853.zip","group":"S3","meeting":"S3-115","year":2024,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":true,"clauses_affected":"6.1.5.2","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240855","title":"CR on Security vulnerability fix for use of AES-GCM and AES-GMAC in 33.203","source":"Apple","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"CR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":5751,"status":"not pursued","reservation_date":"2024-05-03 15:45:23","uploaded":"2024-03-05 15:51:16","revisionof":"S3-240575","revisedto":"","release":"Rel-18","crspec":"33.203","crspecversion":"17.1.0","workitem":[{"winame":"TEI18"}],"crnumber":278.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115_Athens\/Docs\/S3-240855.zip","group":"S3","meeting":"S3-115","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240856","title":"Add some context to 5GMSG on AKMA Ua star protocol","source":"ZTE","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":6221,"status":"agreed","reservation_date":"2024-05-03 15:45:24","uploaded":"2024-03-05 15:51:16","revisionof":"S3-240622","revisedto":"","release":"Rel-18","crspec":"33.501","crspecversion":"18.4.0","workitem":[{"winame":"TEI18"}],"crnumber":1937.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"SP-240371","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115_Athens\/Docs\/S3-240856.zip","group":"S3","meeting":"S3-115","year":2024,"uicc_affected":false,"me_affected":true,"ran_affected":false,"cn_affected":true,"clauses_affected":"Annex Y.2, Y.3","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240857","title":"Correction of UDM service naming","source":"BSI (DE)","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"CR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":3291,"status":"agreed","reservation_date":"2024-05-03 15:45:24","uploaded":"2024-03-05 15:51:16","revisionof":"S3-240329","revisedto":"","release":"Rel-18","crspec":"33.501","crspecversion":"18.4.0","workitem":[{"winame":"5GS_Ph1-SEC"}],"crnumber":1900.0,"crrevision":1.0,"crcategory":"A","tsg_crp":"SP-240342","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115_Athens\/Docs\/S3-240857.zip","group":"S3","meeting":"S3-115","year":2024,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":true,"clauses_affected":"3.1, 6.1.3.2.0","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240858","title":"Updating Internet Drafts to Final RFCs (Rel-17)","source":"Ericsson","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":6641,"status":"agreed","reservation_date":"2024-05-03 15:45:25","uploaded":"2024-03-05 15:51:16","revisionof":"S3-240664","revisedto":"","release":"Rel-17","crspec":"33.434","crspecversion":"17.3.0","workitem":[{"winame":"eSEAL"}],"crnumber":18.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"SP-240354","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115_Athens\/Docs\/S3-240858.zip","group":"S3","meeting":"S3-115","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240859","title":"Updating Internet Drafts to Final RFCs (Rel-18)","source":"Ericsson","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":6651,"status":"agreed","reservation_date":"2024-05-03 15:45:26","uploaded":"2024-03-05 15:51:16","revisionof":"S3-240665","revisedto":"","release":"Rel-18","crspec":"33.434","crspecversion":"18.1.0","workitem":[{"winame":"eSEAL"}],"crnumber":19.0,"crrevision":1.0,"crcategory":"A","tsg_crp":"SP-240354","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115_Athens\/Docs\/S3-240859.zip","group":"S3","meeting":"S3-115","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240860","title":"Annex regarding assets and threats specific to the PCF network product class","source":"BSI (DE)","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":7251,"status":"agreed","reservation_date":"2024-05-03 15:45:27","uploaded":"2024-03-05 15:51:16","revisionof":"S3-240725","revisedto":"","release":"Rel-18","crspec":"33.926","crspecversion":"18.2.0","workitem":[{"winame":"SCAS_5G_PCF"}],"crnumber":86.0,"crrevision":3.0,"crcategory":"B","tsg_crp":"SP-240362","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115_Athens\/Docs\/S3-240860.zip","group":"S3","meeting":"S3-115","year":2024,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":false,"clauses_affected":"2, Annex X(new)","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240868","title":"Issue in NSSAA procedures for multiple registration","source":"Huawei, HiSilicon","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"discussion","for":"Endorsement","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":4281,"status":"noted","reservation_date":"2024-05-03 15:45:34","uploaded":"2024-03-05 15:51:16","revisionof":"S3-240428","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115_Athens\/Docs\/S3-240868.zip","group":"S3","meeting":"S3-115","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240940","title":"LS on Registering JWT Claims at IANA","source":"Ericsson","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"LS out","for":"Discussion","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":94000,"status":"approved","reservation_date":"2024-05-03 15:46:11","uploaded":"2024-03-05 15:51:17","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"CT","Cc":"CT3,CT4","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115_Athens\/Docs\/S3-240940.zip","group":"S3","meeting":"S3-115","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240990","title":"SCPAC: Updates to Security for Selective SCG Activation","source":"Samsung, Ericsson, Huawei, HiSilicon, Apple, Nokia, Nokia Shanghai Bell, Intel","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":242,"status":"agreed","reservation_date":"2024-05-03 15:46:39","uploaded":"2024-03-05 15:51:17","revisionof":"","revisedto":"","release":"Rel-18","crspec":"33.501","crspecversion":"18.4.0","workitem":[{"winame":"TEI18"}],"crnumber":1970.0,"crrevision":"","crcategory":"B","tsg_crp":"SP-240371","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115_Athens\/Docs\/S3-240990.zip","group":"S3","meeting":"S3-115","year":2024,"uicc_affected":false,"me_affected":true,"ran_affected":true,"cn_affected":false,"clauses_affected":"3.2, 6.10.2.X(new), 6.10.2.X.1(new), 6.10.2.X.2 (new), 6.10.X.3 (new), 6.10.2.X.4 (new), Annex A.16","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240991","title":"UPU Header Security","source":"Lenovo","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":7541,"status":"not pursued","reservation_date":"2024-05-03 15:46:40","uploaded":"2024-03-05 15:51:17","revisionof":"S3-240754","revisedto":"","release":"Rel-18","crspec":"33.501","crspecversion":"18.4.0","workitem":[{"winame":"5GS_Ph1-SEC"}],"crnumber":1962.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115_Athens\/Docs\/S3-240991.zip","group":"S3","meeting":"S3-115","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240992","title":"Clarification on the function of UE ID trusted non-3GPP access","source":"Huawei, HiSilicon","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":5301,"status":"agreed","reservation_date":"2024-05-03 15:46:41","uploaded":"2024-03-05 15:51:17","revisionof":"S3-240530","revisedto":"","release":"Rel-18","crspec":"33.501","crspecversion":"18.4.0","workitem":[{"winame":"TEI18"}],"crnumber":1923.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"SP-240371","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115_Athens\/Docs\/S3-240992.zip","group":"S3","meeting":"S3-115","year":2024,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":true,"clauses_affected":"7A.2.1","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240993","title":"Correction to validation of usage of X.509 certificate procedure","source":"Nokia, Nokia Shanghai Bell, Ericsson","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":5831,"status":"not pursued","reservation_date":"2024-05-03 15:46:42","uploaded":"2024-03-05 15:51:17","revisionof":"S3-240583","revisedto":"S3-241826","release":"Rel-18","crspec":"33.310","crspecversion":"18.2.0","workitem":[{"winame":"ACM_SBA"}],"crnumber":199.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115_Athens\/Docs\/S3-240993.zip","group":"S3","meeting":"S3-115","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-241039","title":"Alignment of 33.122 for RNAA","source":"NTT DOCOMO","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":18,"ainumber":"4.1.15","ainame":"All other maintenance topics (not listed above)","tdoc_agenda_sort_order":131,"status":"agreed","reservation_date":"2024-05-03 15:47:01","uploaded":"2024-03-05 15:51:18","revisionof":"S3-240475","revisedto":"","release":"Rel-18","crspec":"33.122","crspecversion":"18.2.0","workitem":[{"winame":"SNAAPPY"}],"crnumber":62.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"SP-240370","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115_Athens\/Docs\/S3-241039.zip","group":"S3","meeting":"S3-115","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0}]